Airtag hacks - scanning via browser, removing speaker and data exfiltration
Until the Apple Airtag came out a few months ago I hadn’t really looked into the tag tracking market. Turns out there were already quite a lot of offerings available before Apple joined the market, most notably Tile.
However, I wanted to try out the Airtag and ended up ordering a few.
This post will explore three things:
- Removing the speaker of my Airtag
- Using Browser APIs to scan for Airtags (if you don’t have an iPhone but someone tries to stalk you this might be handy)
- Explore data exfiltration via Airtags and Apple’s “Find My” network
By the way, when you order your Airtags online you can customize them. So, I have some cool icons on mine, like this one: